top of page

Search Results

103 items found for ""

  • THINK LIKE A HACKER | GSA

    THINK LIKE A HACKER To win the fight against cybercriminals, it helps to think like a hacker. In this guide, we explain the terminology and techniques used by cyber thieves, and share seven important strategies for protecting your valuable data. To receive our Guide, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Think Like a Hacker' Guide shortly! RESOURCES Receive Report HOME

  • DATASHEET GA GATEWAY | GSA

    GoAnywhere Gateway provides an additional layer of security when exchanging data with your trading partners, enabling you to keep file sharing services and documents safely in your private/internal network. This datasheet summarises its key technical features. View Report RESOURCES HOME

  • INFO TECH REPORT 24 | GSA

    Independent Info-Tech MFT Quadrant Report (2024) Once again, respected tech analysts Info-Tech have evaluated the most popular MFT software and vendors, and found that GoAnywhere is the top MFT solution. Here’s their 2024 independent report. To receive a Complimentary Copy of the Report, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Independent Info-Tech MFT Quadrant Report' shortly! RESOURCES Receive Report HOME

  • SECURE YOUR CLOUD DATA | GSA

    SECURE YOUR CLOUD DATA Whether you are already moving select pieces of your business to the cloud, just starting the cloud conversation, or are considering establishing a hybrid environment, you're in good company. Organisations move to the cloud in some fashion for its flexibility, scalability, and faster deployment. However, there is still hesitancy in adapting cloud technology due to security concerns as well as compliance requirements, and a lack of visibility and control. A 2023 Cloud Security Report, which surveyed the challenges and priorities of more than 750 cybersecurity professionals, found that 39% of respondents already have more than half of their workloads in the cloud, and 58% planned to get to that level in the next 12–18 months. However, Cloud security continues to be a significant concern, with 95% of surveyed organisations concerned about their security posture in public cloud environments. In this article, we explore how a robust Managed File Transfer (MFT) solution can help protect your data transfers, in transit and at rest, without compromising the convenience or cost-effectiveness of moving your business to a cloud-based environment. Cloud File Transfers Most organisations oversee dozens (if not hundreds or thousands) of in-house file transfers a day. Whether it’s sending files to employees, transferring reports to trading partners, receiving data from third-party vendors, or collecting sensitive information from customers, it’s all part of the exchange of information that is regularly processed. Where do cloud-based file transfers fit in? Cloud infrastructure can give companies a lot of leeway. Some data can be managed in the cloud, or all of it can be — the choice is entirely up to you. Moving data to the cloud can be as simple as transferring files and folders to whatever storage platform you use with your provider. And with strong encryption and security policies in place, you can control who has access to that business-critical, sensitive data in the cloud. Data that’s been entrusted to the cloud is kept in physical servers and data centres managed by cloud computing services. Almost all file movement between a business, its employees, its trading partners, and its remote locations can happen through the cloud. Sensitive information can move quickly and efficiently between the business and wherever it’s stored (even on servers around the world), which gives organisations the ability to operate smoothly and access their data from anywhere. Because everything is stored off-site, local outages and user errors are minimised, bettering the chances that important, scheduled transfers will complete successfully. The Current State of Cloud D ata Security For cloud computing platforms like Amazon Web Services, Microsoft Azure, and Google Cloud, security of customer data is one of their highest priorities. They have a variety of resources in place to protect their clients’ privacy, but despite their best attempts, these measures don’t always stop data loss, compromised information, or unexpected cloud server outages. Cloud security is a two-way street. Researching each cloud provider’s cybersecurity methods and selecting the best one for your organisation is imperative — a positive step toward ensuring your data’s integrity. But it’s not the only step. IT teams are just as responsible for the security of their sensitive business data as the cloud platforms that hold it. Whether your organisation is thinking of deploying to the cloud or already has, you'll need to perform due diligence regarding your processes and policies. Start by asking questions like these: What are our top security considerations? How will our IT team processes change? What vulnerabilities have been introduced or addressed from moving to the cloud? Do we have points of failure that should be planned for? Are cloud file transfers properly encrypted to minimise risk of data breaches? Protecting Your File Transfers Many of these questions are subjective, of course. Each IT team is likely to answer them in different ways, based on your company policies and processes. But to achieve the best possible cloud security, don’t overlook the current state of your file transfers. Encryption is often the last line of defence between a malicious user or human error and sensitive information. If, however, data is properly secured with strong encryption protocols during transfers as well as when idle and sitting on a server, a cloud breach is far less likely to result in data exposure. For those who must comply with regulations like HIPAA, GDPR, GLBA, PCI DSS, and SOX, following encryption requirements in the cloud comes with extra benefits — as long as the keys for encrypted data are safe, breached information can’t be read, preventing hackers from selling or otherwise exploiting your or your customers sensitive data. File Transfers and the Cloud When moving your data between your network and the cloud, it’s considered best practice to always encrypt your files and protect your communication using secure network protocols like SFTP, FTPS, or SCP. Your files, databases, and even entire folders should be encrypted at rest, too, whether or not the cloud platform you’ve chosen already secures it. A common dated (and not recommended) approach to file transfers uses custom scripts created by internal programmers. The scripts often include commands for encryption, which may or may not be simple to modify, depending on your team's given skillset. While this file transfer process "can" work for a while, as it addresses basic company needs initially, as the number of file transfers rise, so does the difficulty of maintaining a homegrown solution. And that’s not including other possible roadblocks, like an inability to handle logging capabilities or alerts when a file transfer fails. Managed file transfer solutions provide organisations with helpful, robust features that enable them to grow with their data exchange requirements –– especially beneficial when moving to a cloud environment. GoAnywhere Managed File Transfer GoAnywhere MFT eliminates the need for homegrown scripts and multiple programs by streamlining the file transfer process. It can be installed in a cloud-based environment (single or multi) or on-premises via a variety of platforms, giving you full control of your deployment. Transfers can be scheduled and automated with custom workflows (projects), and data can be sent securely between systems, employees, customers, and trading partners. Meanwhile, administrators are given a single point of control with extensive security settings, audit trails, and reports, greatly reducing the possibility of user errors and oversights. GoAnywhere also provides high return on investment by reducing the time spent on manual labour, improving the quality of file transfers, making security more cost-effective, and helping organisations meet a variety of requirements including PCI DSS, HIPAA, GDPR, and FISMA. MFT Security and Encryption All file transfers are protected with popular encryption protocols, including SFTP, FTPS, FTP, SCP, AS2, HTTPS, Open PGP, and ZIP with AES. In the GoAnywhere MFT solution. A built-in key manager allows administrators to create, import, export, and manage Open PGP keys, SSH keys, and SSL certificates. And for those who must comply with FIPS 140-2, validated encryption ciphers can be enabled for SSL and SSH protocols. GoAnywhere offers connections to a variety of servers and guarantees file delivery by using connection retries and file auto-resume. Admins can monitor transfer success, review account activity, and authenticate user access from anywhere via GoAnywhere’s browser-based interface. Beyond basic encryption practices and features, GoAnywhere also addresses several business requirements for the cloud. GoAnywhere and Amazon EC2 For organisations that use AWS as their cloud provider, GoAnywhere MFT easily integrates with Amazon Elastic Cloud Computing (EC2). You can find, and quickly install, GoAnywhere MFT on Amazon's AWS Marketplace. You can use GoAnywhere’s secure FTP technology to protect sensitive file transfers with strong encryption technology and modern authentication methods. This creates encrypted tunnels between client and server systems and provides confidentiality and integrity to critical transmissions. Secure FTP also protects any user credentials that flow over the connection. Do you need to address high volumes of file transfers in your organisation? With GoAnywhere’s clustering technology, file transfers and other processes can be distributed across multiple Amazon EC2 instances for load balancing. And when an instance is taken offline, file transfers and jobs will be automatically routed to other installations in the cluster. GoAnywhere and Microsoft Azure For organisations that use Microsoft as their cloud provider, GoAnywhere integrates with Azure to provide IT teams with secure file transfers between all active parties. Installing and running GoAnywhere MFT on Azure is an effortless process, as everything you need is included, reducing the need for additional third-party solutions. You can install GoAnywhere on your choice of Azure-supported Windows or Linux operating systems, then set up your trading partner accounts and file transfer processes. GoAnywhere’s intuitive design and modular features allow you to be up and running on Azure quickly. If you want to scale GoAnywhere on Azure, file transfers and other processes can be distributed across multiple Azure VM instances for load balancing. Connections to a variety of databases including Microsoft SQL Server through GoAnywhere, and user accounts can be authenticated against Microsoft Active Directory to simplify user management for your file collaboration needs. Conclusion Organisations worldwide have already, or soon will be turning their focus to the cloud. Yes, security will continue to be an issue in all configurations of technology on-premises, in the cloud, or in hybrid situations. And moving to the cloud isn't without risk. To help prevent data loss, IT teams must do due diligence and take steps to protect their data — starting with their cloud file transfer process and solutions. Implementing a managed file transfer solution like GoAnywhere MFT enables businesses to control how their data is protected, in transit and at rest. Through strong encryption protocols, file monitoring, and integration with Amazon EC2 and Microsoft Azure, IT teams can rest assured that organisational and customer data is safe in a variety of environments without running outdated, unsecure expensive, time-consuming scripts and programs. Is it time to enhance the security of YOUR cloud data? If you’d like to discuss how GoAnywhere MFT can enhance the security of your organisation’s cloud data, please feel welcome to reach out to our Business Manager, Bradley Copson. He’s always happy to have an obligation-free discussion, explain how quickly and easily we can transition your organisation to the class-leading MFT solution, and offer you a zero-cost Proof of Concept. At Generic Systems Australia, we’re your local experts in secure Managed File Transfer. RESOURCES HOME

  • WHY AUTOMATING ENCRYPTION | GSA

    Why Automating Encryption and Decryption Makes Cybersecurity Sense How does encryption and decryption work? Which types of encryption are best suited to different data transfer needs? How can encryption be integrated with your existing business technologies? Our guide, Why Automating Encryption and Decryption Makes Good Cybersecurity Sense, offers a quick read of the basics of encryption, answering these questions and more. To Receive Our Report, Please Fill in the Form Below: First name Last name Enter your email address Phone You'll receive the 'Why Automating Encryption and Decryption Makes Cybersecurity Sense' shortly! RESOURCES Receive Report HOME

  • MEETING CDR OBLIGATIONS | GSA

    Australia’s Consumer Data Right (CDR) requires businesses to carefully plan how they handle, store and disclose the consumer data they collect. This primer explains your obligations, the breaches that can occur, and a strategy to avoid them. Meeting Your Business’s CDR Obligations Australia’s Consumer Data Right (CDR) requires businesses to carefully plan how they handle, store and disclose the consumer data they collect. The CDR provides individuals with the right to access their personal information, and the right of data portability found in the European General Data Protection Right (GDPR). An economy-wide program, it was launched in 2020, and is presently being rolled out sector by sector. CDR enables consumers to safely and conveniently elect to share data about them, held by data holders, with accredited providers. The government’s aim with the program is to make it easier for consumers to compare products and services, access better value and improved services, and assist financial management. Phased Rollout CDR has already been rolled out to the banking and energy sectors. The Australian Competition and Consumer Commission and co-regulator the Office of the Australian Information Commissioner are responsible for ensuring accredited providers and data holders comply with their CDR obligations. As companies and consumers have greater access to data, and more data files are being transferred than ever before, greater safeguards to protect this data are required. Regulators are deploying a range of tools to monitor and access the available information to ensure consumers have their data security and integrity in place. Their stated goal is to prevent breaches of the CDR’s obligation through compliance management and enforcement. Business Impact Businesses need to consider how they handle the data they collect, including how that data is harvested, stored, used and disclosed, and how it will make consumer data available to its customers and their nominated recipients when requested to do so. Special care of internal systems, processes and compliance is required to prevent breaches. Examples of CDR breaches include: Repeated refusal to disclose consumer data Misleading or deceptive conduct Data collection without valid consent Intentional use or disclosure of data inconsistent with consumer consent Insufficient security controls to protect CDR data Complying with the CDR Businesses under the CDR protocols should consider: Reviewing their policies and processes for privacy and data handling Training staff on their CDR obligations and how to manage the risks involved with handling consumer data Establishing breach notification procedures One way to ensure files are kept secure both at rest and while in transit is to incorporate a managed file transfer system, like GoAnywhere MFT. This secure, automatic software can protect data by: Controlling access to files and data Encrypting data Establishing the correct security settings when sending and/or receiving highly confidential emails Providing automated audits, reports and logs showing who accessed which data, who it was transmitted to, etc. GoAnywhere can also enhance business efficiency be replacing the myriad of legacy manual approaches for file sharing that can proliferate across businesses over time. Further consumer-oriented resources on CDR are available from the Australia Government’s website . RESOURCES HOME

  • LOCAL BUYERS GUIDE | GSA

    MFT Local Buyer's Guide Finding the right Managed File Transfer solution for your organisation may not be easy... with dozens of factors to consider - including industry and government compliance requirements, cloud vs on-prem solutions, critical cybersecurity protections, pricing models and more. In this Asia and Pacific Region MFT Local Buyer’s Guide, you’ll find the key considerations, the questions you need to ask vendors, and a wealth of other advice to help you successfully evaluate MFT solutions. To receive our Local Buyers' Guide, simply submit your email address below: First name Last name Enter your email address Phone You'll receive the Buyers' Guide shortly! RESOURCES Receive Report HOME

  • BEST PRACTICES FOR CLOUD MFT | GSA

    Best Practices for Cloud MFT Data is the lifeblood of modern business. And most modern organisations rely to some extent on the Cloud as they transfer files between employees, trading partners, and customers. However, permitting your precious data to go “off-prem” increases the risk it will be intercepted or accessed by cybercriminals. To help you guard against cybercrime, here are best practices for safeguarding your data on its way to, from and in, the Cloud. Start with the Right Cloud Provider Cloud providers come in all sizes, capabilities … and risk profiles. Ensure your Cloud provider uses robust security protocols and safeguards. Do they utilise the latest encryption protocols, and offer strong user authorisation and access controls? Do their data transmission and storage approaches meet the regulatory requirements for your industry? What performance levels does your Cloud provider commit to? Can they quickly and reliably receive, store and transmit your business-essential files? Can your Cloud provider easily integrate with your existing systems? Can your Cloud provider offer an appropriate level of technical support when you need it? Select the Right Type of Cloud Cloud computing comes in three basic flavours… Public, Private, and Hybrid. Each offers differing degrees of security and risk. 1. Public Clouds may offer relatively robust security features. However, they must be appropriately configured to offer protection for your files. 2. Private Clouds provide enhanced levels of control and isolation. However, these come at a higher cost. 3. Hybrid Clouds combine elements of both, enabling you to balance security and cost-efficiency. Meet Industry Compliance Requirements Some industries are subject to heightened regulatory requirements regarding data storage and transfer. Even when using an “off-prem” Cloud provider, you remain responsible for meeting those requirements. Failing to utilise an appropriately compliant Cloud environment can lead to fines, law suits, loss of customers, loss of supplier trust, and reputational damage. Maintain Control and Data Sovereignty Governments increasingly require organisations to maintain authority and control of data within their jurisdictional boundaries – aka, “data sovereignty”. Private and Hybrid Cloud environments provide inherently greater authority over where data is stored, access permissions, and retention policies. In this way, they enable organisations to better navigate myriad data sovereignty mandates and evolving compliance standards . Utilising Managed File Transfer as a Service (MFTaaS) MFTaaS is an approach which can help organisations streamline their file transfer processes, while offering robust security, scalability, reliability, anywhere access and cost-effectiveness. However, be sure to confirm your MFTaaS solution offers robust encryption and security protocols, can scale grow with your organisation's needs, and complies with the industry regulations relevant to your business. Technical Best Practices for Cloud File Transfers Ensure secure and efficient transmission of data in a Cloud environment by observing these technical requirements: 1. Data Encryption at Rest and in Transit : Utilise encryption protocols like SSL/TLS for data in transit and encryption solutions provided by your Cloud provider for data at rest. In private Cloud settings, you can also leverage approaches like Bring Your Own Key (BYOK) or Hold Your Own Key (HYOK). 2. Data Loss Prevention (DLP) : A robust DLP solution helps prevent unauthorised data transfers and leakage by monitoring data in real-time and preventing it from being transmitted outside of your organisation. 3. Intrusion Detection Systems (IDS) : By monitoring and alerting IT security teams to any suspicious file transfer behaviour, IDS helps nip security breaches in the bud. Employee Best Practices Having your team follow best practices is also essential to secure data transfer and storage. 1. Staff Training : Teach your employees to recognise data security risks, and how to avoid them. Place special focus on phishing and social engineering – two of the most prevalent cybercriminal threats. 2. Multi-Factor Authentication (MFA) : Enforce MFA for file transfers, and utilise phishing-resistant techniques. 3. Access Control : Restrict access to files and systems, and provide users with only the minimum level of access necessary to perform their role. Implement a regular cycle of access permission reviews. Audit, Backup and Recovery Best Practices Continuous monitoring and auditing of Cloud file transfers not only maintains the security of your data, it also helps identify and mitigate potential threats, while monitoring on-going compliance. Log Analysis and Security Information and Event Management (SIEM) proactively monitor transfers, and enable your IT team to react quickly to emerging threats and incidents. Data backup and disaster recovery are the final critical components of your comprehensive safeguards against data loss in Cloud file transfers. They ensure that, if a disaster occurs, your organisation can provide business continuity by maintaining the availability and integrity of data. Making the Cloud Safe for File Transfers By following these best practices, the Cloud can be an efficient, reliable and secure element within your organisation’s overall data transfer approach. At Generic Systems Australia, we use and recommend the class-leading (link) managed file transfer solution, GoAnywhere MFT, for the way it integrates with the Cloud and embeds best practices. Providing peace of mind, by securing sensitive files in transit and at rest, GoAnywhere automates and encrypts data between an organisation and its trading partners, protecting it from unnecessary vulnerabilities while improving efficiency and reducing costs. If you’d like to learn more about GoAnywhere MFT , our Business Manager, Bradley Copson, would be happy to offer you an obligation-free discussion , a no cost trial, or even a Proof of Concept for your business RESOURCES HOME

  • DATASHEET THREAT PROTECTION | GSA

    GoAnywhere MFT is the world’s leading Managed File Transfer solution. This datasheet summarises its key technical features. Review the report below. RESOURCES HOME

  • INFO TECH REPORT 22 | GSA

    Info-Tech Report MFT Quadrant Report (2022) Independent analysts Info-Tech compared MFT solutions and vendors in 2022, and found that GoAnywhere MFT was the unsurpassed leader in the field. To receive a Complimentary Copy of their Report, please submit your email address below: First name Last name Enter your email address Phone You'll receive the 'Info-Tech Report MFT Quadrant Report' shortly! RESOURCES Receive Report HOME

bottom of page